Patent classifications
H04M2203/6054
Systems and methods for optimizing voice verification from multiple sources against a common voiceprint
Systems and methods for authenticating a user using a voice activated device. The method includes receiving first data representing a user identifier corresponding to a user and second data representing a device identifier corresponding to the voice activated device. The method further includes determining user metadata corresponding to the user identifier and a device audio type corresponding to the device identifier. The method also includes calculating a risk score based on the user metadata. The method further includes calculating a length of spoken voice utterance based on the calculated risk score. The method also includes receiving and processing third data representing a spoken voice utterance having the calculated length corresponding to the user using the voice activated device. The method further includes validating the user in response to determining that the processed third data substantially matches the voiceprint associated with the user.
Breakout session assignment by device affiliation
Presented herein are techniques in which a device connects a plurality of user devices to a communication session in which a plurality of participants of the respective plurality of user devices communicate using audio and/or video and determines respective locations of the plurality of user devices. The devices receives, from a particular user device of the plurality of user devices, a request to group the user devices into a plurality of groups to form one or more breakout communication sessions off of the communication session, assigns user devices to respective ones of the plurality of groups based on the respective locations such that user devices at a common location are assigned to a same group, and transmits information identifying the plurality of groups to the particular user device.
Machine learning for improving quality of voice biometrics
Methods and systems are disclosed herein for improving the quality of audio for use in a biometric. A biometric system may use machine learning to determine whether audio or a portion of the audio should be used as a biometric for a user. A sample of the user's voice may be used to generate a voice signature of the user. Portions of the audio that do not meet a similarity threshold when compared with the voice signature may be removed from the audio. Additionally or alternatively, interfering noises may be detected and removed from the audio to improve the quality of a voice biometric generated from the audio.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
A SYSTEM AND METHOD FOR HYBRID CALLBACK MANAGEMENT WITH TRANSPARENT USER AUTHENTICATION
A system and method for hybrid callback management with transparent user authentication, utilizing a callback cloud and an on-premise callback system, allowing users to be verified via his or her biometrics, and also allowing brands to utilize a hybrid system that protects against any premise outages or cloud service faults and failures by introducing redundancies and co-maintenance of data key to callback execution.
CALL BLOCKING AND/OR PRIORITIZATION IN HOLOGRAPHIC COMMUNICATIONS
Aspects of the subject disclosure may include, for example, receiving first imaging data corresponding to first images of a first plurality of first users, each of the first users being located at a first location; obtaining first hierarchical rank data, the first hierarchical rank data being indicative of a first hierarchical ranking of each of the first users relative to each other of the first users; generating, based at least in part upon the first imaging data and the first hierarchical rank data, second imaging data, and sending the second imaging data to a second location, the second location being separate from the first location, the second imaging data enabling a first holographic projector at the second location to present first holograms, the first holograms comprising one or more first emphasized images representing a first particular one of the first users who is ranked highest by the first hierarchical rank data, and the first holograms further comprising one or more first un-emphasized images representing one or more first other users of the first users who are not ranked highest by the first hierarchical rank data. Other embodiments are disclosed.
STRONG AUTHENTICATION OF A USER OF A COMMUNICATION TERMINAL
A method for authenticating a user of a service on a communication terminal is performed by the communication terminal. The method includes transmitting to a server a request to access the server, the request comprising an identifier associated with the communication terminal and an identifier associated with a required service in the server, receiving, from an authentication device, an authentication request asking the user to pronounce at least one word, and communicating the at least one word pronounced by the user to the device. When the at least one pronounced word corresponds to a voiceprint of the user stored beforehand in association with the identifier of said communication terminal, the terminal then accesses the service or receives from the device an additional user authentication request.
SWITCHING BETWEEN WATCHES OR OTHER ACCESSORIES
Systems, methods and non-transitory computer readable media for allowing a user to switch between wearable items that have been paired or associated with an electronic device, such as a smartphone, are described. In one embodiment, the wearable items automatically detect a removal of a first wearable item from a user's body and an attachment of a second wearable item to the user's body. Messages from the wearable items are transmitted to the electronic device to allow the electronic device to switch the active wearable item from the first wearable item to the second wearable item. The switch can occur while the electronic device is in a locked state, and the electronic device can synchronize the second wearable item with data received from the first wearable item. Other embodiments are also described.
INTERCEPTING AND CHALLENGING UNWANTED PHONE CALLS
A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.
SYSTEMS AND METHODS TO AUTOMATICALLY JOIN CONFERENCE
Systems and methods are described to enable a device of a user to automatically join an ongoing conference, where the device is not currently joined to the conference. A first audio signature is generated based on voices of users already in the conference, and a second audio signature is generated based on an audio signal captured by a microphone of the device associated with the first user when the device associated with the first user was not joined to the conference. The first audio signature and the second audio signature are compared, and in response to determining that first audio signature matches the second audio signature, the device associated with the first user is joined to the conference.